Threat actors are employing the NetSupport Remote Access Trojan (RAT) to target the education, government, and business services sectors, according to findings by VMware Carbon Black researchers. The NetSupport RAT is distributed through various methods, including fraudulent updates, drive-by downloads, malware loaders like GHOSTPULSE, and phishing campaigns.
VMware Carbon Black has identified at least 15 new infections related to NetSupport RAT in recent weeks. Originally designed as a legitimate remote administration tool, NetSupport Manager has been repurposed by malicious actors to serve as a beachhead for subsequent attacks.
The delivery mechanisms for NetSupport RAT involve deceptive websites, fake browser updates, and other means. In one campaign detailed in August 2022, compromised WordPress sites were used to display fraudulent Cloudflare DDoS protection pages, leading to the distribution of NetSupport RAT.
Once installed on a victim’s device, NetSupport RAT possesses capabilities such as behavior monitoring, file transfers, manipulation of computer settings, and lateral movement to other devices within the network.
This malicious use of a tool initially designed for technical assistance underscores the evolving threat landscape and the adaptability of cybercriminals.